Operations | Monitoring | ITSM | DevOps | Cloud

Five Key Identity Governance Features That Your Identity and Access Management Solution Does NOT Support

Since the start of the COVID-19 pandemic, identity management has taken center stage as the key enterprise security practice for enabling remote workforces while protecting company data and IT services.

Enabling Secure Access for the Federal Government - Meeting Comply to Connect Mandates

Government IT organizations must demonstrate and maintain compliance with a large and growing number of regulations and standards around network access control (NAC), ensuring that all connected devices to their environment are not vulnerable is a key requirement. Comply to connect (C2C) simplifies this by enforcing that patches and hardened configurations are applied to devices before they connect and updated continually.

What's New with Ivanti Device and Application Control 5.3

What’s New in Ivanti Device & Application Control 5.3 Nearly every company in the world incorporates a Mac endpoint into the organization. Without a device control solution to manage these stations we see a real possibility for data leakage risk. This loss happens mainly because of insider threats. Ivanti Device and Application Control has historically performed well protecting our customers against these types of threats, but the Mac endpoints can still represent a risk.

From Virtual Reality to Improved Work Life Balance, Here's Why UEM Cloud R76 and UEM Core 11.1 are so Cool

We are excited to announce the availability of the new MobileIron UEM Cloud R76 and UEM Core 11.1, our on-premises offering. As with past releases of MobileIron UEM, our product team continues to focus their efforts on use cases that help our customers to enhance security, improve the admin/user experience and support new use cases driven by OS updates.

Not Another Blog about SolarWinds - 3 Ways Ivanti can Help Protect You

The SolarWinds exploits have been widely reported, fully covered, and basically as we would say in Aussie – Done to Death Mate. But some of the info got me thinking, especially this article from my buddies at Microsoft which gives some great background and flows for that how the attacks were actually working. I’ve been working with Ivanti Application Control – formerly AppSense Application Manager for over 17 years.

Don't Sweat the Small Stuff but Consider This with Sweating IT Assets

Sweating IT assets, ever heard of them? It might seem nonsensical to imagine an IT asset perspiring from being overworked, but it’s actually not a far-off analogy. When a business delays the purchasing of new technology as long as possible, it’s called ‘sweating assets.” Companies have their reasons for this strategy, but it usually comes down to one thing: an attempt at cost-savings. Do sweating assets actually help to achieve this and where do they miss the mark?

Ivanti Insights Episode 3: In the World of Privacy, Nothing is Free - Including Social Media Apps

Did you know there are currently 4.20B social media users globally? That’s 53% of the total global population! From the most popular social media platforms like Facebook and YouTube, to the hottest up and coming platforms like TikTok and Clubhouse, there is one thing they all have in common: privacy regulations and considerations should be and need to be top priority. Ivanti’s Sr.

2021 Secure Consumer Cyber Report: Protecting the Everywhere Workplace

The 2021 Secure Consumer Cyber Report provides one of the industry’s most comprehensive studies about the shift in consumer behavior as a result of increased work-from-home initiatives. With the influx of unsecured personal devices and high-risk employee behavior, what does the threat landscape look like today? The newly released report found that, with the dramatic increase in remote work due to the pandemic, the threat to enterprise data is higher than ever.

Key benefits of advanced HTML5 that accelerate performance and simplify secure remote desktop access

What does it mean to securely access remote desktops from any device and from anywhere? 2020 was a game changer for the future of business operations and how, when and where people work. To enable secure remote access across an enterprise means making the Everywhere Workplace possible. Here’s how.